On 2011-10-14, torvlnt...@fastmail.fm <torvlnt...@fastmail.fm> wrote: > A guess is that there might be a link between the bridges > enumeration attack mentioned in that article and the recent spike > in bridge use, for which one of the hypotheses was a botnet > (https://lists.torproject.org/pipermail/tor-talk/2011-September/0 > 21347.html). > > Creating many circuits through the bridges is a way to make them > visible to a large proportion of relays, including potentially > malicious ones.
You can only create many circuits through a bridge if you already know its TCP address. > A possible countermeasure might be something similar to the > "Entry Guards" mechanism for circuits that go though bridges. We plan to make bridges direct their clients' circuits through their entry guards. See https://svn.torproject.org/svn/projects/misc/rransom/2011/dev-meeting-photos-2011-07-25-01/orig/100_2373.jpg for the few notes we have online from when we discussed bridge concealment at the Tor developer meeting this summer. Robert Ransom _______________________________________________ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk